Re: [DNSOP] Debugging DNSSEC SERVFAILs on resolver side

Evan Hunt <each@isc.org> Wed, 11 February 2015 16:42 UTC

Return-Path: <each@isc.org>
X-Original-To: dnsop@ietfa.amsl.com
Delivered-To: dnsop@ietfa.amsl.com
Received: from localhost (ietfa.amsl.com [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 264841A8993 for <dnsop@ietfa.amsl.com>; Wed, 11 Feb 2015 08:42:26 -0800 (PST)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -1.911
X-Spam-Level:
X-Spam-Status: No, score=-1.911 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, SPF_PASS=-0.001, T_RP_MATCHES_RCVD=-0.01] autolearn=ham
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id 8QsTd4fq4YsR for <dnsop@ietfa.amsl.com>; Wed, 11 Feb 2015 08:42:19 -0800 (PST)
Received: from mx.ams1.isc.org (mx.ams1.isc.org [IPv6:2001:500:60::65]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id BEAE61A028A for <dnsop@ietf.org>; Wed, 11 Feb 2015 08:42:19 -0800 (PST)
Received: from bikeshed.isc.org (bikeshed.isc.org [IPv6:2001:4f8:3:d::19]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "mail.isc.org", Issuer "RapidSSL CA" (not verified)) by mx.ams1.isc.org (Postfix) with ESMTPS id 203441FCCB7; Wed, 11 Feb 2015 16:42:17 +0000 (UTC)
Received: by bikeshed.isc.org (Postfix, from userid 10292) id C6384216C31; Wed, 11 Feb 2015 16:42:15 +0000 (UTC)
Date: Wed, 11 Feb 2015 16:42:15 +0000
From: Evan Hunt <each@isc.org>
To: Petr Spacek <pspacek@redhat.com>
Message-ID: <20150211164215.GB53748@isc.org>
References: <54DB64BC.2020102@redhat.com> <debf337e31e1202620df1368dc4a2c97@pierky.com> <20150211160813.GB53392@isc.org> <54DB8506.5080107@redhat.com>
Mime-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Disposition: inline
In-Reply-To: <54DB8506.5080107@redhat.com>
User-Agent: Mutt/1.4.2.3i
Archived-At: <http://mailarchive.ietf.org/arch/msg/dnsop/c-df4vqapBvrj7DPYbmFuB14q3g>
Cc: Pier Carlo Chiodi <pierky@pierky.com>, Tomas Hozza <thozza@redhat.com>, IETF DNSOP WG <dnsop@ietf.org>
Subject: Re: [DNSOP] Debugging DNSSEC SERVFAILs on resolver side
X-BeenThere: dnsop@ietf.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: IETF DNSOP WG mailing list <dnsop.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/dnsop>, <mailto:dnsop-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/dnsop/>
List-Post: <mailto:dnsop@ietf.org>
List-Help: <mailto:dnsop-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/dnsop>, <mailto:dnsop-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 11 Feb 2015 16:42:26 -0000

On Wed, Feb 11, 2015 at 05:36:22PM +0100, Petr Spacek wrote:
> In other words, I do not think we can prevent people from doing crazy things
> just by obscuring format of diagnostics data. I'm sure somebody will try to
> parse free-form string 'signature expired 1 week ago' and do some decisions
> from that :-)

I wasn't thinking of obscuring anything, just mentioning my one major
concern about including diagnostics with SERVFAIL responses: I fear
it will be a tempting target for someone to attempt misguided cleverness.

-- 
Evan Hunt -- each@isc.org
Internet Systems Consortium, Inc.